Okta Workforce Identity Cloud
A tool for finding AWS credentials in files, optimized for Jenkins integration.
Manage user identities and permissions for secure access control.
A tool for finding AWS credentials in files, optimized for Jenkins integration.
A PHP OAuth 2.0 authorization server implementation with support for various grants and RFCs.
Zoho Vault is a secure password management tool that allows you to store and automatically fill in passwords on websites and apps.
BeyondTrust Privileged Access Management (PAM) provides comprehensive security controls for privileged accounts and users.
Okta Workforce Identity Cloud is an identity and access management platform that provides secure, streamlined access for an organization's workforce across various applications and resources.
Repository documenting common techniques to bypass AppLocker with verified, unverified, and generic bypasses.
Zoho Vault is a secure password management tool that allows you to store and automatically fill in passwords on websites and apps.
A decentralized identity verification solution that enables organizations to issue, manage, and verify digital credentials for user-owned identity scenarios.
Airlock Secure Access Hub is an integrated security platform that combines identity and access management with web application and API protection to secure digital applications while maintaining user experience.
This article discusses protected accounts and groups in Active Directory, providing examples and screenshots to illustrate key concepts.
Encrypt Kubernetes Secrets into SealedSecrets for safe storage and controlled decryption within the cluster.
Akamai MFA is a cloud-based multi-factor authentication solution using FIDO2 standard to secure workforce logins across various applications through smartphone push notifications.
CredStash is a tool for managing and securely storing credentials.
A blog post explaining the concept of Active Directory Trusts and their enumeration and exploitation
A fully automated AD build script that configures a domain fully with adjustable XML files.
Repokid uses Access Advisor to remove unused service permissions from IAM roles in AWS.
Airiam delivers comprehensive cybersecurity, managed IT, and digital transformation services, empowering organizations to prioritize core business objectives. Our seasoned experts leverage extensive experience across diverse cybersecurity landscapes, from sophisticated ransomware attacks to critical data breaches, ensuring robust protection. By integrating all your IT and security needs under one strategic provider, Airiam eliminates critical gaps and fosters a unified, resilient technological environment.